Search

Advanced Search

e-SamikSha Training-cum-Workshop Conducted on 20th August 2014 at Cabinet Secretariat

Dr. Shubhag Chand, Delhi shubhag[at]nic[dot]in
  |   Aug 25, 2014
Ms. Seema Jain, SSA, NIC provided the technical insight of the e-SamikSha portal.
Ms. Seema Jain, SSA, NIC provided the technical insight of the e-SamikSha portal.

Mr Yogesh Agrawal SO(SB), NIC while answering the queries of participants.
Mr Yogesh Agrawal SO(SB), NIC while answering the queries of participants.

“e-Samiksha is a real time, on-line system for monitoring of follow-up action on the decisions taken during the presentations made by different Ministries/Departments to the Prime Minister. The follow-up action in respect of each decision is to be updated by the concerned Ministry/ Department/ Agency as and when the status changes or at least every month. Different users such as the PMO/ Cabinet Secretariat/ Ministries/ Departments can securely access the system through a Log-In/ Password. This system can also be configured to review the follow up action in respect of other meetings, if required.”

 In this context, a Training workshop on e-SamikSha On-line System was organized for various Ministries/Department of Government of India at Conference Room, Cabinet Secretariat, Rashtrapati Bhawan, New Delhi on 20th August 2014. The program was chaired by Mr. Alok Vardhan Chaturvedi, Joint Secretary, Cabinet Secretariat, Government of India

 Training program started at 12:30 PM at Conference Room, Mr. Alok Vardhan Chaturvedi gave the welcome address followed by introductory speech. He gave the description about the project. Then Ms. Seema Jain, SSA, NIC provided the technical insight of the e-SamikSha portal.

 Ms. Seema Jain gave the complete demonstration about the working of the e-Samiksha Portal regarding the roles of ministry users. A real time example was discussed to give them the better insight of the decision making process during the meetings and loading of minutes in system for the resolution of the issues. After this the admin role was also explained to give them the complete insight of the process.

 Mr. Yogesh Agrawal, SO(SB), NIC answered the queries of participants after the training session.

 During the training session, Credential for the e-SamikSha Portal has been given to the respective user of Ministries/Department.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...